The art of civilian intelligence. This is an Ethical Hacker show with a focus on holistic systems alignment. A cyber wizard uses multi-dimensional maps of Information Security through the Bitcoin prism to study local cultural threat modelling.
Sat, October 05, 2024
The first season of "Bitcoin Security Maps" was completed mid-summer of 2024. 30 episodes of boring transcendental InfoSec foundations in the sense of a "deep" exposé of the civilian intelligence realm. This includes a daily foundations setup for basic Recon in the WebAppSec Testing series and a full InfoSec Philosophy and Theory series with a unique sequence and a new human communications protocol as the final conclusion. This approach has been used for a strong spectral Kb (knowledgebase) in the direction of ongoing national security disclosures. The best parts will begin in the upcoming second season. These will feature very precise mappings of bitcoin security in relation to electrical and economic energy. ARTICLE: https://medium.com/cyberpower-telenoia/bitcoin-security-maps-first-season-dd3cb60d8654 VIDEO: https://www.youtube.com/watch?v=G5ljwXSH6Vc I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnera
Sat, August 24, 2024
From actual certified plan of directions to CV submissions. This episode is an update on the documentation overview of the architecture of seeking vocational engagement as a Web App Sec Testing professional. Not only does one's life need to be organized but so does one's computer and one's digital actions, as much as the actual work submitted as a deliverable! As mere personal computing examples, there are sticky notes and there are desktop folders and then there are web browser bookmark folders! Not only are there job boards but there are internal and external job boards for which one has to build a profile and copy the contents of the corresponding CV parts! To use AI in all this, one's life story has to be organized and fed into the right computing machine which respects privacy and is aligned with one's culture. Lots of paradoxical security concerns in seeking vocational engagement as a security professional. In this case, an interview was the feelgood moment. 10 months to keep trying, at maximum. VIDEO: https://www.youtube.com/watch?v=-UhyQ4hbDfY I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: <a href="https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484c
Sat, August 24, 2024
All about the author's general professional amelioration. Completed global-to-local intelligence gathering through discerning civilian observation of daily life. Designed a New Human Comms Protocol for InfoSec pros. Published 25 new podcast episodes outlining general foundations for the significance of Web App Sec work in an emergent world of security concerns. Maintained attunement to pulse of helpful brighter knowledge. Enjoyed affirming interview. Planned continuation of sensible Bug Bounty Hunter and InfoSec Analyst paths. VIDEO: https://www.youtube.com/watch?v= ghjL-9 yJ8 I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: https://njump.me/npub1esawtrr4d8vm4cewfqtmaptv32fky6vx5jch3tlpe3fdq
Sat, August 24, 2024
This episode is about the author's study process for passing the foundational Cyber Security "CompTIA Security+" exam in 2023. It's all about the timeframe, study materials and the live testing approach. One book has the knowledge. Another book has the tests. An online course compliments this. Answering a couple thousand quizz questions helps. Making mind maps assists in weaving sense from the realm of computing machines which themselves are interconnected as part of their existence, so in a way this helps make the theory real, because it is founded on what is known about reality through physics. ARTICLE: https://medium.com/cyberpower-telenoia/how-i-certified-with-comptia-security-in-2023-142cdfb5b2 VIDEO: https://www.youtube.com/watch?v=BRQ-uILXAgU I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSI
Sat, August 24, 2024
As a Web Application Bug Bounty Hunter it may be helpful to consider the placement of one's work on a map of possibilities. Working at a company is not the same as working freelance in this field and the positions differ greatly. Organizations primarily hire juniors on the defensive side, while it is easier for freelancers to start themselves on the junior offensive side. This in turn depends on the civilization one is from and the various existing cultures! The global knowledge base and certifications can be indicators of the quality and depth of insight which is needed in order to understand the nature of a successful Web Application Security Tester's daily life. There are many open source approaches one may take, from entry-level general quick courses to very specialized long term deeper studies. ARTICLE: https://medium.com/cyberpower-telenoia/certification-roadmap-for-the-bug-bounty-hunter-2023-5a5de844266e VIDEO: https://www.youtube.com/watch?v=ONVF-3jjlOY I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: <a href="https://medium.com/cyberpower-telenoia/vulnerable-podca
Sat, August 24, 2024
This is an episode about the initial mappings of how the city of Wrocław works in Poland. It's about the tangible apparent system and the possible hints of the hidden matrix in its framework. By following the money and the prime industries as they interconnect human civilian daily life, it is possible to get a sense of the pulse of the networks. There is a security presence, and an ongoing development of infrastructure which maintains a general neutral sense of balance. How secure is this from any outside threats, whether physical, virtual or mental? F# around and find out! Maybe this will lead to creating a local NGO for Web App Sec wizards or a mesh of BTC LN nodes for the significant organizations supporting ecological thriving in town. VIDEO: https://www.youtube.com/watch?v=7MzHUwBGxLM I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/<
Sat, August 24, 2024
All about the Podcasting2.0 V4V Bitcoin Lightning Network Node Monetization setup for this podcast. From cosmic laws to philosophy and theory, and the practice of moist human interaction with digital virtual realms. The creation of audio-visual content in the civilian matrix, with all the foundational steps involved in a successful censorship-resistant run of the first season. It's all about the mapping of Bitcoin and Nostr private key security. ARTICLE: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f VIDEO: https://www.youtube.com/watch?v=1LH3gnupmgY I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/
Sat, August 17, 2024
Technological and psychological advancements in the energy, banking and telecommunications industries which are not aligned with the interests of those who maintain the popular paradigm of these sectors in civilization are the primary targets of all attack vectors both online and offline. For example, the open sourced knowledge of Bitcoin can transform global economic energy but after a decade of successful existence, the average person continues to believe it is merely a high-risk digital thing to invest in for personal gain. The "malleable quantum plasma" of bitcoin, a mathematics on telecom, built on decentralized hardware, provides entirely new business paradigms. Inside the metaverses, the cypherpunk origins of modern cryptography enable new building blocks of non-fungible crypto-identities which form the foundations for decentralized autonomous organizations, which are part of virtual environments, which can be human-made, artificial or mixed and augumented - all inside the civilizational planetary virtual realm. So it is important for the InfoSec professional to understand where the next iterations of the internet are heading with Web3. ARTICLE: https://medium.com/cyberpower-telenoia/nfts-as-virtual-plasma-ffe6c4e7999c VIDEO: https://www.youtube.com/watch?v=Oh6IPjoZH7M I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: <a href="http
Fri, August 16, 2024
This is the angry episode about why in this day and age of rapid technological advancement and accessibility, it is important not to tolerate entities who are factually misaligned to the point of having their mental contents, speech and behaviour identified as severe cases of covert, malicious, and destructive sociopaths, narcissists and psychopaths, namely the "Dark Triad". ARTICLE: https://medium.com/cyberpower-telenoia/flashing-cells-of-digital-illiteracy-1a7e0074db15 VIDEO: https://youtu.be/PDDIyos0VrY I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: https://njump.me/npub1es
Thu, August 15, 2024
InfoSec professionals study and apply facts which are often found outside of contemporary popular knowledge. Vipassana is significant because it is the theory and practice of observing reality as it is, in the human experience. What is the personal experience of national security in times of war? How are human sensations relevant to suffering? What is the meaning of impermanence in security? Understanding where mind meets matter can be the source of right actions, and right livelihood for the professional working in any field of security. ARTICLE: https://medium.com/cyberpower-telenoia/the-treasure-of-human-sensations-vipassana-93a2d5a282c VIDEO: https://www.youtube.com/watch?v=IA9iQavVrIc I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: <a href="https://www.mateuszkujawski.com/" target="_bl
Wed, August 14, 2024
With clarity of meaning, the wizards of InfoSec can transform design, communications, business and economies. New professional foundations arising out of cosmic laws and holistic health may provide the facts about the risks of severe, covert, malicious and destructive mental disorders in society. Evolving the paradigm of security must include the understanding of the manipulation of human perception itself, which includes the perception of time. A deep ecological sense of home can provide the personal building blocks for a meaningful lifestyle today and for future generations. ARTICLE: https://medium.com/cyberpower-telenoia/cyberpower-telenoia-c1786af847c VIDEO: https://www.youtube.com/watch?v=bjy4u2rTW-k I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: ht
Sun, July 21, 2024
This episode is a merging of several concepts into a practical working draft for improving human security communications. The presented sequence for alignment enables a receptivity of new intelligence. An exchange between varying levels of developed spheres allows for new InfoSec solutions to be accessed. ARTICLE: https://medium.com/cyberpower-telenoia/new-human-infosec-intelligence-comms-protocol-for-values-alignment-89243b09855f VIDEO: https://www.youtube.com/watch?v=yT3cBN-mOV8 I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: https
Sat, July 20, 2024
This is an episode about the simple ability to discern oneself and others in various surface states of being. This is done in order to align the most basic initial communications. It is the first point of contact in a sequence of interactions with increasing sensitivity. The aim is to enhance deeper stages of exchange. ARTICLE: https://medium.com/cyberpower-telenoia/human-being-quadrants-as-collaborative-social-engineers-9ad2e8676534 VIDEO: https://www.youtube.com/watch?v=lBbNyBOZse0 I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: https://njump
Fri, July 19, 2024
This episode is about the significance of the consensus of facts within a realm. These can be unified. An expanded explanation is provided for a framework of multidimensionality within the human performing security operations and the assets being secured, such as the data within a web application. In order to deliver the right work, there is a need for the understanding of dimensions in which people and computing machines exist. These are currently not one. ARTICLE: https://medium.com/cyberpower-telenoia/on-the-significance-of-spheres-in-cyber-security-663d15a70934 VIDEO: https://www.youtube.com/watch?v=n43IB9oSGfY I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS
Wed, July 17, 2024
This episode explores the multidimensionality of websites, for example as portals of a given local culture into its virtual realm. The expression of the physical infrastructure often reflects in the virtual digital domain. Who controls and maintains either of these? Who will be responsible for the artificial general intelligence? As security testers we may choose to understand the dimensions of web applications as they correspond in society. ARTICLE: https://medium.com/cyberpower-telenoia/multi-dimensional-security-mapping-of-websites-a1dcf226a410 VIDEO: https://www.youtube.com/watch?v=4DR5G7UrGfc I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: <a href
Sat, July 06, 2024
This episode is the first in a bi-weekly update about local vocational engagement attempts. Presentations include actual CVs, methodologies, and a debrief on the organization of information and job boards. Some results are mentioned. VIDEO: https://www.youtube.com/watch?v=z80XJvz7c08 I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: https://njump.me/npub1esawtrr4d8vm4cewfqtmaptv32fky6vx5jch3tlpe3fdqg9qmjjq0a6e9d https://infosec.exchange/@meshcode https://linktr.ee/meshcode https://x.com/meshcode <a hr
Fri, July 05, 2024
This introductory episode to Recon covers foundational theory including tactics, techniques and actual command-line procedures. From manual passive indirect information gathering to automated scans and into stealth packet manipulation. Examples are given of this particular first stage of a Vulnerability Assessment in a sequential manner in order to enhance the effectiveness of mapping the attack surface of the target web application. ARTICLE: https://medium.com/cyberpower-telenoia/web-app-sec-recon-black-box-foundations-and-ttps-4bf095b7c004 VIDEO: https://www.youtube.com/watch?v=T5NLyAC2XGk I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: <a href="https://
Thu, July 04, 2024
This is an important episode about the relationship of personal development to the corresponding security layers one can be expected to have working knowledge about. The concentric enfoldment ranges from Secret through Business, into Professional and finally the Specialization layer, at which most security operatives play with they keyboards. The Secret layer includes current military affairs as well as metaphysics and parapsychology beyond contemporary popular sciences, while the Specialization layer is merely the layer at which most security professionals communicate. This is the layer of our Web Application Security Testing work with Recon. ARTICLE: https://medium.com/cyberpower-telenoia/levelled-discernment-of-information-security-layers-26f89c1da2ca VIDEO: https://www.youtube.com/watch?v=CHQPc1e2zVI I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-
Wed, July 03, 2024
This episode is about the critical significance of security subcultures and the link between deep personal holistic maturity and the problem of competing nations through obscurity of consciousness. The layers of mappings briefly touch on possible solutions through prompt intelligence and decentralized collaborative local care. ARTICLE: https://medium.com/cyberpower-telenoia/mapping-the-right-security-subcultures-457b9a1e4cff VIDEO: https://www.youtube.com/watch?v=StaVYQg-WxU I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: https://njump.me/npub1esawtrr4d8vm4cewf
Mon, July 01, 2024
This episode is about the existing open bootcamp potential of highly-functioning neuro-nontypical autistic people, specifically Aspies (those previously diagnosed with Asperger's) who may wish to work as Ethical Hackers by collaborating with peers in the form of an online community organization. Specifically the aim is to work together on Bug Bounty Hunting platforms in order to professionally help businesses secure their websites by finding and reporting security vulnerabilities in their products. There are dramatic reasons to believe that Aspies in particular are natural daily hackers in the ordinary world. Such an Aspie group always works at its best and brightest. ARTICLE: https://medium.com/cyberpower-telenoia/aspie-hackers-bug-whisperers-5b32089ea0bd VIDEO: https://www.youtube.com/watch?v=imr10PHM7tQ I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-20
Sun, June 30, 2024
This episode describes the advantages of integrating Virtual Reality as part of the bounty hunter's collaborative toolset. The timeless and infinite spaces of VR can be shared for collaborative efforts, in their own OPSEC approaches. Listed are tools for creating 3D VR mind maps and their presentation environments, as well as a method for gated entry to such environments using NFTs. ARTICLE: https://medium.com/cyberpower-telenoia/web-app-bug-bounty-maps-for-vr-c959d56d79e3 VIDEO: https://www.youtube.com/watch?v=NLp5PmLhna8 I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: <a href="https://njump.me/npub1esawtrr4d8vm4cewfqtmaptv32fky6vx5jch3tlpe3fdqg9qmjjq0a6e9d" target="_blank
Sun, June 30, 2024
This episode is about understanding the language within the actions of a web application security tester, in order to function more effectively and efficiently within a professional business context as a bug bounty hunter. By overlapping a map of security with a map of the product, the tester may begin grasping the origins of "bugs" in weaknesses, and begin to taste the difference in the possible severity levels of vulnerabilities as well as the potential impact these may have. Calculations of these aspects can be made available to clients when addressing the risks, based on the context of the application, and the right approach can provide more substantial remuneration. ARTICLE: https://medium.com/cyberpower-telenoia/the-sphere-of-weakness-risk-and-mitigation-532756302887 VIDEO: https://www.youtube.com/watch?v=4Knrncz0_bs I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitco
Fri, June 28, 2024
This episode is about the forms of Web App security testing and how these each have a general progression which depends on the context of the application and the organization behind it. We go from Threat modelling to Development (SSDLC), to Audits, to Vulnerability Assessments (with our Recon specialization), to outsourced Pentesting, To Red Teams working with Blue and Purple teams. Clearly this is a different dimension than the popular defensive approach taught at most public higher level institutions. ARTICLE: https://medium.com/cyberpower-telenoia/from-threat-models-to-red-teams-8d42e6aa2482 VIDEO: https://www.youtube.com/watch?v=_BFP0dp3RNE I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUT
Thu, June 27, 2024
This is an episode about personal organization as a web application security tester. Knowing that improper input validation is a common entry point for a hacker, we can map that the bug bounty hunting field over the Clearnet commonly encompasses character transception, the sending and receiving of symbols and pulses between browser and server. To have a clear view of this, one needs organization in personal life, technological competence including the main computing machine one is using, the knowledge base reference material, select skills, methodologies and playbook sequencing to name a few aspects. That all begins and ends on pressing "enter", the execution. ARTICLE: https://medium.com/cyberpower-telenoia/web-app-security-testing-day-job-organization-5766a48b9aa VIDEO: https://www.youtube.com/watch?v=onWyYYVW6ls I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-no
Thu, June 27, 2024
This episode is about defining the main terminology in the comprehension of offensive black box testing of web applications within IT. Listed are some open source methodologies and communities practicing various approaches depending on context. Knowing that threats do exist, we are basically testing software. ARTICLE: https://medium.com/cyberpower-telenoia/kindergarden-of-web-application-security-black-box-testing-6eabdc87dac7 VIDEO: https://www.youtube.com/watch?v=cOOdQtUbP5Q I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: https://njump.me/
Wed, June 26, 2024
This episode is about clarity of choice when working in Web Application Security Testing. From the alignment of one's economic energy (bitcoin) with psychology and lifestyle to the selection of integrating computing machines and Information Security within, all the way through the multidimensionality of threat actors in Cyber Security. The mini map includes four layers of the security subculture: Secret, Business, Professional and Specialization. ARTICLE: https://medium.com/cyberpower-telenoia/choosing-it-infosec-website-testing-4aad457dcc00 VIDEO: https://www.youtube.com/watch?v=YT8nYtzrrTM I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: <a href="https://njump.me/npub
Mon, April 22, 2024
This is the introductory episode to the summaries of civilian intelligence gathering by the author in Wrocław, Poland. It is stated that the physical location of one's life is significant, as is the knowledge of how the system functions in one's city, society and entire jurisdiction. To start, this can be assessed by simple observations and by following the money. The average consensus of reality can form the outline of the reasons for the existence of much of the visible infrastructure, whether physical or virtual. Civilian values which correspond to the maintenance and treasury of a thriving ecological environment are noted. Next, the security of the system begins to be assessed based on the threat modelling. VIDEO: https://www.youtube.com/watch?v=bJZGZYsI0-8 I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIA
Mon, April 22, 2024
An introduction to the episode set about a professional refinement journey in pursuit of vocational engagement, as part of the Local Intelligence Series. VIDEO: https://www.youtube.com/watch?v=PgIF87-21oY I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: https://njump.me/npub1esawtrr4d8vm4cewfqtmaptv32fky6vx5jch3tlpe3fdqg9qmjjq0a6e9d https://infosec.exchange/@meshcode https://linktr.ee/meshcode https://x.com/meshcode https://www.linkedin.c
Mon, April 22, 2024
This episode introduces the Bitcoin Security Maps podcast, focusing on civilian intelligence, technology, and ecological harmony. The host shares their background and motivation for the podcast, emphasizing the use of multidimensional maps for understanding security and interconnected systems.
Sat, April 20, 2024
This episode introduces the Bitcoin Security Maps podcast, focusing on civilian intelligence, technology, and ecological harmony. The host shares their background and motivation for the podcast, emphasizing the use of multidimensional maps for understanding security and interconnected systems. VIDEO: https://www.youtube.com/watch?v=W-3R-n2ez1s I am grateful for you tuning in! WEBSITE AND EMAIL: https://www.bitcoinsecuritymaps.com/ info@bitcoinsecuritymaps.com RSS: https://serve.podhome.fm/rss/4c2f3b8a-3142-4536-91c3-a612d7694051 AUDIO PLAYLIST: (V4V RSS setup for streaming sats on Bitcoin Lightning) https://fountain.fm/show/Qe7TPBbzNXjhdD3s7QQc VIDEO PLAYLISTS: https://www.youtube.com/@BitcoinSecurityMaps/playlists DONATE HERE: https://buymeacoffee.com/meshcode https://getalby.com/p/mateusz NOSTR: (zaps welcome) https://njump.me/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr https://primal.net/p/npub1kg6ftkv6ea43lv7cjx4fspesxrhlf23ku4crku8wumk50v7azujsztntgr PUBLICATIONS: https://medium.com/cyberpower-telenoia https://mirror.xyz/theskyishigh.eth PODCAST SETUP: https://medium.com/cyberpower-telenoia/vulnerable-podcasting-2-0-bitcoin-ln-node-monetization-setup-2024-7a7f1484cb4f AUTHOR WEBSITE: https://www.mateuszkujawski.com/ AUTHOR'S SOCIALS: https://njump.me/npub1esawtrr4d8vm4cewfqtmaptv32fky6vx5jch3tlpe3fdqg9qmjjq0a6e9d https://infosec.exchange/@meshcode https://linktr.ee/meshcode <a href="https://x.com/mes
loading...